Download Chapter 1 Communication Networks and Services

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

IEEE 1355 wikipedia , lookup

Network tap wikipedia , lookup

Distributed firewall wikipedia , lookup

Internet protocol suite wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Net neutrality law wikipedia , lookup

Net bias wikipedia , lookup

Peering wikipedia , lookup

Airborne Networking wikipedia , lookup

Computer network wikipedia , lookup

Deep packet inspection wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Packet switching wikipedia , lookup

Transcript
Chapter 1
Communication
Networks and Services
Network Architecture and Services
Telegraph Networks & Message Switching
Telephone Networks and Circuit Switching
Computer Networks & Packet Switching
F t
Future
N
Network
t
k Architectures
A hit t
and
d Services
S i
Key Factors in Network Evolution
1
Communication Services &
Applications


A communication service enables the exchange of
information between users at different locations.
Communication services & applications are
everywhere.
E-mail/Web Browsing/messaging
E-mail/Web
server
Exchange of text messages/information via servers
2
1
Many other examples!

Peer-to-peer applications

Napster, Gnutella, KaZaA file exchange

Audio & video streaming

Network games

On-line purchasing

Text messaging in PDAs, cell phones (SMS)

Voice-over-Internet

E-healthcare
3
What is a communication
network?
Communication
Network

The equipment (hardware & software) and facilities
that provide the basic communication service

Equipment

Routers, servers,
switches, multiplexers,
hubs, modems, …

Facilities


Copper wires, coaxial
cables, optical fiber
Ducts, conduits,
telephone poles …
How are communication networks designed and operated?
4
2
Services & Applications

Service: Basic information transfer capability




Applications build on communication services



Internet transfer of individual block of information
Internet reliable transfer of a stream of bytes
Real-time transfer of a voice signal
E-mail & web build on reliable stream service
Fax and modems build on basic telephone service
New applications build on multiple networks

SMS builds on Internet reliable stream service and
cellular telephone text messaging
5
Network Architecture Evolution
?
Information transfe
er
per second
1.0E+14
1.0E+12
1.0E+10
1.0E+08
1.0E+06
1.0E+04
1.0E+02
1.0E+00
1850
Telegraph
networks
1875
1900
Telephone
networks
1925
1950
1975
2000
Internet, Optical
& Wireless
networks
Next
Generation
Internet
6
3
Network Architecture Evolution

Telegraph Networks


Telephone Networks




Circuit Switching
Analog transmission → digital transmission
Mobile and wireless communications
Internet


Message
g switching
g & digital
g
transmission
Packet switching & computer applications
Next-Generation Internet

Multi-service packet switching network
7
Telegraph Networks

Telegraph: a message is transmitted across a
network using signals


Drums, beacons, mirrors, smoke, flags, semaphores…
Electricity, light
8
4
Electric Telegraph Networks

Electric telegraph networks exploded

Message switching & Store-and-Forward
Store and Forward operation
Key elements: Framing, Multiplexing, Addressing,
Routing, Forwarding

Optical telegraph networks disappeared

Message
Message
Message
Source
Message
Switches
Destination
9
Elements of Telegraph Networks

Digital transmission



Multiplexing


Text messages
g converted into symbols
y
((dots/dashes,
zeros/ones)
Transmission system designed to convey symbols
Framing needed to recover text characters
Message Switching



Messages contain
M
t i source & destination
d ti ti addresses
dd
Store-and-Forward: messages forwarded hop-by-hop across
network
Routing according to destination address
10
5
Bell’s Telephone

Alexander G. Bell (1875) working on harmonic telegraph to
multiplexing discovered voice signals can be transmitted
directly
 Microphone converts voice pressure variation (sound) into
analogous electrical signal
 Loudspeaker converts electrical signal back into sound



Telephone patent granted in 1876
Signaling required to establish a call
Bell Telephone Company founded in 1877
Signaling + voice signal transfer
11
The N2 Problem

Initially, p2p direct communications - for N users
to be fully
y connected directly
y

How many connections required? key problems?


Requires too much space for cables
Inefficient & costly since connections not always on
1
N
2
N = 1000
N(N – 1)/2 = 499500
4
3
12
6
Circuit Switching
Patchcord panel switch invented in 1877
Operators connect users on demand



Establish circuit to allow electrical current to flow
from inlet to outlet
Only N connections required to central office

1
N
N–1
2
3
13
Hierarchical Network Structure
CO = central office
switching
Toll
trunks
Tandem
Tandem
CO
CO
CO
CO
CO
last mile
Telephone subscribers connected to local CO (central office)
Tandem & Toll switches connect CO’s
14
7
Digitization of Telephone Network

Pulse Code Modulation digital voice signal


Time Division Multiplexing for digital voice



T-1 multiplexing (1961): 24 voice signals = 1.544x106 bps
Digital Switching (1980s)


Voice g
gives 8 bits/sample x 8000 samples/sec = 64x103 bps
Switch TDM signals without conversion to analog form
Digital Cellular Telephony (1990s)
Optical Digital Transmission (1990s)


One OC-192 optical signal = 10x109 bps
One optical fiber carries 160 OC-192 signals = 1.6x1012 bps!
All digital transmission, switching, and control
15
Elements of Telephone Networks

Digital transmission & switching


Circuit switching





User signals for call setup and tear-down
Route selected during connection setup
End-to-end connection across network
Signaling coordinates connection setup
Hierarchical Network



Digital voice; Time Division Multiplexing
Decimal numbering system
Hierarchical structure; simplified routing; scalability
Signaling Network

Intelligence inside the network
16
8
The ARPANET
What is the vulnerability of the telephone system?


(a) Structure of the telephone system.
(b) Baran’s proposed distributed switching system.
17
Computer Network Evolution


1950s: Telegraph technology adapted to computers
1960s: Dumb terminals access shared host computer
 SAGE air defense system, SABRE airline reservation system
 Tree-topology terminal-oriented networks

1970s: Computers connect directly to each other
 ARPANET packet switching network
 TCP/IP Internet protocols
 Ethernet local area network

1980s & 1990s: New applications and Internet growth
 Commercialization of Internet
 E-mail, file transfer, web, P2P, . . .
 Internet traffic surpasses voice traffic
18
9
Terminal-Oriented Networks

Early computer systems very expensive
Time-sharing
Time
sharing methods allowed multiple terminals
to share local computer

Remote access via telephone modems

...
Terminal
Terminal
Modem
Telephone
Network
Modem
Terminal
Host computer
19
Medium Access Control






Dedicated communication lines were expensive
Terminals generated messages sporadically
F
Frames
carried
i d messages tto/from
/f
attached
tt h d terminals
t
i l
Address in frame header identified terminal
Medium Access Controls for sharing a line were developed
Example: Polling protocol on a multi-drop line
Polling frames & output frames
input frames
Terminal
Terminal
...
Terminal
20
10
Multiplexing




Multiplexer allows a line to carry frames that contain
messages to/from multiple terminals
Frames are buffered at multiplexer until line becomes
available, i.e. store-and-forward
Address in frame header identifies terminal
Header carries other control information
Frame
CRC
Information
Terminal
Header
Header
Information
...
Terminal
CRC
Terminal
Multiplexer
Host computer
21
Error Control Protocol


Communication lines introduced errors
Error checking codes used on frames



“Cyclic Redundancy Check” (CRC) calculated based on
frame header and information payload, and appended
Header also carries ACK/NAK control information
Retransmission requested when errors detected
CRC
Information
Header
Terminal
Header
Information
CRC
22
11
Computer-to-Computer Networks

As cost of computing dropped, terminal-oriented
networks viewed as too inflexible and costly
y

Need to develop flexible computer networks



Interconnect computers as required
Support many applications
Application Examples


File transfer between arbitrary computers
Execution of a program on another computer
23
Packet Switching

Network should support multiple applications




Packet switching introduced




Transfer arbitrary message size
Low delay for interactive applications
But in store-and-forward operation, long messages
induce high delay on interactive messages
Network transfers packets using store
store-and-forward
and forward
Packets have maximum length
Break long messages into multiple packets
ARPANET testbed led to many innovations
24
12
The ARPANET
The subnet consists of computers called IMPs (Interface
Message Processors) connected by 56-kbps lines, each
connected to at least two other IMPs: first store
store-and-forward
and forward
packet switching network (datagram-oriented)

The original ARPANET design.
25
ARPANET Applications

ARPANET (NSF-NET) introduced new applications

Email, remote login, file transfer, …
AMES
McCLELLAN
UTAH
BOULDER
GWC
CASE
RADC
ILL
CARN
LINC
USC
AMES
MIT
MITRE
UCSB
STAN
SCD
ETAC
UCLA
RAND
TINKER
BBN
HARV
NBS
26
13
Scale Classification
Classification of networks by scale.

27
Ethernet Local Area Network


In 1980s, affordable workstations available
Need for low
low-cost,
cost high-speed
high speed networks




To interconnect local workstations
To access local shared resources (printers,
storage, servers)
Low cost, high-speed communications with
low error rate possible using coaxial cable
Ethernet is the standard for high-speed wired
access to computer networks
28
14
LAN Classifications
How LANs are distinguished from other networks?




Scale, 10m – 1 Km
transmission technology
topology
Two broadcast networks (a) Bus, (b) Ring
What is the benefit from the restricted network size?
What happens if more than one machine want to transmit?
29
Ethernet Medium Access Control





Network interface card (NIC) connects computers to LAN
Each NIC has globally unique address
Frames are broadcast into coaxial cable
NICs listen to medium for frames with their address
Transmitting NICs listen for collisions with other stations,
and abort and reschedule retransmissions
Transceivers
30
15
The Internet





Different network types emerged for data
p
transfer between computers
ARPA also explored packet switching using
satellite and packet radio networks
Each network has its protocols and is
possibly built on different technologies
Internetworking
gp
protocols required
q
to enable
communications between computers
attached to different networks
Internet: a network of networks
31
What is a protocol?


Communications between computers requires
very specific
ifi unambiguous
bi
rules
l
A protocol is a set of rules that governs how two
or more communicating parties are to interact





Internet Protocol (IP)
User Datagram Protocol (UDP)
T
Transmission
i i C
Control
t lP
Protocol
t
l (TCP)
HyperText Transfer Protocol (HTTP)
Simple Mail Transfer Protocol (SMTP)
32
16
TCP/IP Suite
33
Internet Protocol (IP)




Routers (gateways) interconnect different
networks
Host computers prepare IP packets and transmit
them over their attached network
Routers forward IP packets across networks
Best-effort IP transfer service, no retransmission
Net 1
Net 2
Router
34
17
Addressing & Routing



Hierarchical address: Net ID + Host ID
IP p
packets routed according
g to Net ID
Routers compute routing tables using distributed algorithm
H
H
G
N t1
Net
G
G
H
Net 3
G
Net 5
Net 2
G
Net 4
G
H
35
Transport Protocols



Host computers run two transport protocols on top of IP
to enable process-to-process communications
User Datagram Protocol (UDP) enables best-effort
transfer of individual block of information
Transmission Control Protocol (TCP) enables reliable
transfer of a stream of bytes
Transport
Protocol
Internet
36
18
Names and IP Addresses


Routing is done based on 32-bit IP addresses
Dotted decimal notation
Dotted-decimal


Hosts are also identified by name




128.100.11.1
Easier to remember
Hierarchical name structure
tesla.comm.utoronto.edu
Domain Name System (DNS) provided
conversion between names and addresses
37
Internet Applications





All Internet applications run on TCP or UDP
TCP: HTTP (web); SMTP (e-mail);
(e mail); FTP (file
transfer; telnet (remote terminal)
UDP: DNS, RTP (voice & multimedia)
TCP & UDP incorporated into computer
operating systems
Any application designed to operate over
TCP or UDP will run over the Internet!!!
38
19
Elements of Computer Networks






Digital transmission
Exchange of frames between adjacent equipment
 Framing and error control
Medium access control regulates sharing of
broadcast medium.
Addresses identify attachment to network or
internet.
Transfer of packets across a packet network
Distributed calculation of routing tables
39
Elements of Computer Networks II






Congestion control inside the network
Internetworking
g across multiple
p networks using
g
routers
Segmentation and reassembly of messages into
packets at the ingress to and egress from a network
or internetwork
End-to-end transport protocols for process-to-process
communications
Applications that build on the transfer of messages
between computers.
Intelligence is at the edge of the network.
40
20
Principal Metric Units
41
Links to Information
Assurance related Websites












National Security Agency: http://www.nsa.gov/
NIST, Computer Security Division, Computer Security Resource Center:
http://csrc nist gov/
http://csrc.nist.gov/
Common Criteria for Information Technology Security Evaluation:
http://www.commoncriteriaportal.org/
U.S. Department of Homeland Security: http://www.dhs.gov/
ITU (International Telecommunication Union: http://www.itu.int/
Internet Society (ISOC): http://www.isoc.org/
The Internet Engineering Task Force (IETF): http://www.ietf.org/
Internet Architecture Board (IAB): http://www.iab.org/
International Organization for Standardization (ISO): http://www.iso.org
IEEE Computer Society: http://www.computer.org
Association for Computing Machinery (ACM): http://www.acm.org/
USENIX: The Advanced Computing Systems Association:
http://www.usenix.org/
21